CN108322366A - Access the methods, devices and systems of network - Google Patents
Access the methods, devices and systems of network Download PDFInfo
- Publication number
- CN108322366A CN108322366A CN201710031638.5A CN201710031638A CN108322366A CN 108322366 A CN108322366 A CN 108322366A CN 201710031638 A CN201710031638 A CN 201710031638A CN 108322366 A CN108322366 A CN 108322366A
- Authority
- CN
- China
- Prior art keywords
- access
- terminal
- network
- virtual private
- private network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2854—Wide area networks, e.g. public data networks
- H04L12/2856—Access arrangements, e.g. Internet access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Abstract
The invention discloses a kind of methods, devices and systems of access network.Wherein, which includes:Terminal and server, wherein, terminal, for determining that data connection to be visited needs to connect Virtual Private Network, data to be visited are verified by default verification mode, and access request is sent to server, wherein whether the authentication information that prestores that default verification mode is used to verify terminal meets the standard of access server according to verification result;Network belonging to server is Virtual Private Network;Server is connect with terminal, the access request for receiving terminal transmission, and according to access request by the Virtual Private Network belonging to terminal access server.The present invention is solved due to the low technical problem of logging in VPN is brought in the prior art login efficiency.
Description
Technical field
The present invention relates to application of net fields, in particular to a kind of method, apparatus accessing network and are
System.
Background technology
With the extensive utilization of cloud office technology, user access virtual dedicated network (Virtual Private
Network, abbreviation VPN) become a kind of common working way, which is advantageous in that, on one computer
As long as the computing capability of computer disclosure satisfy that virtual machine calculates demand, so that it may to realize multi-platform do on one computer
Public affairs, and cloud office also provides significant contribution in information security issue, that is, the action or virtual completed on virtual machine
The consortium's inside information stored on machine is not stored on local computer, will not because of the copy in local computer,
It is involved in the problems, such as information-leakage.
User is generally required in the mode of existing logging in VPN voluntarily to dial in by VPN, and by cipher token come complete
At certification, then VPN is disconnected by actively disconnecting the means such as VPN or computer shutdown suspend mode.
And to show as login process cumbersome for the major defect of subscriber dialing VPN access company Intranet, need login account and
Password, and wait for and being verified.
For the above-mentioned problem low due to the login efficiency that logging in VPN is brought in the prior art, not yet propose at present effective
Solution.
Invention content
An embodiment of the present invention provides a kind of methods, devices and systems of access network, at least to solve due to existing skill
The low technical problem of logging in VPN is brought in art login efficiency.
One side according to the ... of the embodiment of the present invention provides a kind of system of access network, including:Terminal and service
Device, wherein terminal is verified for determining that data connection to be visited needs to connect Virtual Private Network by default verification mode
Data to be visited, and according to verification result access request is sent to server, wherein default verification mode is for verifying terminal
Whether the authentication information that prestores meets the standard of access server;Network belonging to server is Virtual Private Network;Service
Device is connect with terminal, the access request for receiving terminal transmission, and will be belonging to terminal access server according to access request
Virtual Private Network.
Optionally, terminal includes:First terminal and second terminal, wherein first terminal, for determining that data to be visited connect
It connects and needs to connect the Internet resources in Virtual Private Network;And send access authentication request to second terminal, wherein access authentication
Request is used to indicate second terminal according to the authentication information that prestores in access authentication request, judges whether to confirm first eventually
Hold access virtual private network;The authentication information that prestores includes:Verify certificate;Second terminal is connect with first terminal, is used for
Access authentication request is received, and detects whether verification certificate matches with the verification signaling of access virtual private network;It is tied in detection
Fruit is to return to access confirmation message to first terminal in the case of being, so that first terminal foundation accesses confirmation message to clothes
Business device sends access request.
Further, optionally, verification certificate includes:Account and password, account and password are for logging in Virtual Private Network
Network.
Optionally, first terminal includes:Custom system and checking system, wherein checking system, for detecting custom system
In data to be visited whether connect the Internet resources in Virtual Private Network;And send prompt message to custom system, wherein carry
Show information be used to indicate custom system whether access virtual private network;Custom system is connect with checking system, is carried for receiving
Show information, and is returned according to prompt message and confirm access information;Checking system is additionally operable to according to the confirmation access letter received
Breath sends access authentication request to second terminal.
Optionally, first terminal is additionally operable to after access virtual private network, in preset time section, is detected whether
Whether judge current sensing time in the case where testing result is no in the presence of the operation to Virtual Private Network request data
More than or equal to the upper limit threshold in preset time section, in the case where the judgment result is yes, sent to Virtual Private Network disconnected
Open connection request, wherein disconnect request, be used to indicate the chain that server disconnects first terminal access virtual private network
Road.
Optionally, second terminal includes:Mobile terminal;Wherein, mobile terminal is asked for receiving access authentication, and according to
The verification array to prestore in the verification certificate and mobile terminal that are carried in being asked according to access authentication is verified, and is being proved to be successful
In the case of, return to access confirmation message to first terminal.
Optionally, server is additionally operable to receive the request that disconnects of first terminal transmission, and is asked according to open circuit connection
It asks, cuts off first terminal access virtual private network.
Other side according to the ... of the embodiment of the present invention provides a kind of method of access network, including:First terminal is true
Fixed data connection to be visited needs to access Virtual Private Network;First terminal sends access authentication request to second terminal,
In, access authentication request, the identity that prestores for being used to indicate second terminal according to the first terminal carried in access authentication request is tested
Information is demonstrate,proved, judges whether to confirm first terminal access virtual private network;First terminal receives second terminal according to access authentication
Ask the access confirmation message returned;First terminal is according to the Virtual Private Network belonging to access confirmation message access server.
Optionally, first terminal determines that data connection to be visited needs to access Virtual Private Network to include:First terminal
The data of current accessed are parsed, obtain the target access information in data, wherein target access information includes:Path address, mutually
At least one of the access identities carried in networking protocol address or data;First terminal is by target access information and prestores visit
It asks that data list is matched, judges whether target access information accesses access virtual private network in data list with prestoring
Mark matching.
Further, optionally, first terminal judge target access information whether with prestore access data list in connect
After the mark matching for entering Virtual Private Network, first terminal sends access authentication request to second terminal and includes:Judging to tie
Fruit is first terminal display reminding information, wherein prompt message is used to indicate user, and whether access of virtual is special in the case of being
Network;First terminal, which receives, confirms incoming instruction, wherein confirms incoming instruction, is used to indicate first terminal and confirms access of virtual
Dedicated network;First terminal sends access authentication request according to confirmation incoming instruction to second terminal.
Optionally, first terminal includes according to the Virtual Private Network belonging to access confirmation message access server:It is connecing
In the case of entering the verification signaling that confirmation message carries second terminal, first terminal is according to verification signaling and the authentication letter that prestores
Breath generates access request;First terminal sends access request to server.
Further, optionally, the authentication information that prestores includes:Verify certificate, wherein verifying certificate includes:Account
And password, account and password are for logging in Virtual Private Network.
Optionally, this method further includes:After first terminal access virtual private network, in preset time section,
First terminal detects whether the operation for having to Virtual Private Network request data;In the case where testing result is no, first
Terminal judges whether current sensing time is greater than or equal to the upper limit threshold in preset time section;The case where judging result is to be
Under, first terminal disconnects request to Virtual Private Network transmission, wherein disconnects request, it is disconnected to be used to indicate server
Open the link of first terminal access virtual private network.
Other side according to the ... of the embodiment of the present invention, the method for providing another access network, including:Second terminal
Receive the access authentication request that first terminal is sent;Second terminal prestores according to the first terminal carried in access authentication request
Authentication information judges whether to confirm first terminal access virtual private network;In the case where the judgment result is yes, second
Terminal sends access confirmation message to first terminal.
Optionally, prestore authentication information of the second terminal according to the first terminal carried in access authentication request, sentences
It is disconnected whether to confirm that first terminal access virtual private network includes:First carried in second terminal parsing access authentication request is eventually
The authentication information that prestores at end, the verification certificate in the identity information that obtains prestoring, wherein verification certificate includes:Account and close
Code, account and password are for logging in Virtual Private Network;Second terminal detection verification certificate whether with access virtual private network
Verification signaling matching, wherein verification signaling be second terminal in pre-stored verification array.
Other side according to the ... of the embodiment of the present invention, the method for providing another access network, including:Server connects
Receive the access request that first terminal is sent;Server is according to access request by the virtual private belonging to first terminal access server
Network.
Optionally, the Virtual Private Network belonging to first terminal access server is included by server according to access request:
Access request is parsed, the verification of prestore authentication information and the second terminal of the first terminal carried in access request is obtained
Signaling;It verifies and prestores authentication information and verify whether signaling meets default access standard;The case where check results are to be
Under, server is by the Virtual Private Network belonging to first terminal access server.
Optionally, this method further includes:Receive first terminal transmission disconnects request;And it is asked according to open circuit connection
It asks, cuts off first terminal access virtual private network.
Other side according to the ... of the embodiment of the present invention, the method for providing another access network, including:Detect user
Whether data to be visited connect the Internet resources in Virtual Private Network in system;In the case where testing result is to be, Xiang Yong
Family system sends prompt message, wherein prompt message be used to indicate custom system whether access virtual private network;According to reception
The confirmation access information that the custom system arrived returns sends access authentication request to second terminal.
Another aspect according to the ... of the embodiment of the present invention provides a kind of method of access network, including:Receive examination system
The prompt message that system is sent;It is returned according to prompt message and confirms access information.
One side according to the ... of the embodiment of the present invention provides a kind of device of access network, including:First detection mould
Block, for determining that data connection to be visited needs to access Virtual Private Network;First sending module, for being sent out to second terminal
Access authentication is sent to ask, wherein access authentication is asked, and is used to indicate second terminal according to first carried in access authentication request
The authentication information that prestores of terminal judges whether to confirm first terminal access virtual private network;First receiving module, is used for
Receive the access confirmation message that second terminal is returned according to access authentication request;First AM access module, for confirming according to access
Virtual Private Network belonging to information access server.
One side according to the ... of the embodiment of the present invention provides the device of another access network, including:Second receives mould
Block, the access authentication request for receiving first terminal transmission;First authentication module, for being carried in being asked according to access authentication
First terminal the authentication information that prestores, judge whether confirm first terminal access virtual private network;Second sends mould
Block, in the case where the judgment result is yes, access confirmation message being sent to first terminal.
Another aspect according to the ... of the embodiment of the present invention provides a kind of Intelligent hardware, including:Transmitter/receivers, processor,
Memory and display screen, wherein transmitter/receivers, the access authentication request for receiving first terminal transmission;Processor, and transmits/receives
Device connects, for according to the authentication information that prestores of first terminal carried in access authentication request, judging whether confirmation the
One terminal for accessing virtual dedicated network, wherein processor is by calling the verification signaling stored in memory to judge whether to confirm
First terminal access virtual private network, and judging result is shown by display screen;Transmitter/receivers, be additionally operable to be in judging result
In the case of being, access confirmation message is sent to first terminal.
One side according to the ... of the embodiment of the present invention provides the device of another access network, including:Third receives mould
Block, the access request for receiving first terminal transmission;Second AM access module, for accessing first terminal according to access request
Virtual Private Network belonging to server.
One side according to the ... of the embodiment of the present invention provides the device of another access network, including:Second detection mould
Block, for detecting whether data to be visited in custom system connect Internet resources in Virtual Private Network;Third sending module,
For in the case where testing result is to be, prompt message to be sent to custom system, wherein prompt message is used to indicate user system
System whether access virtual private network;4th sending module, the confirmation access information that the custom system that foundation receives returns, to
Second terminal sends access authentication request.
Other side according to the ... of the embodiment of the present invention provides a kind of device of access network, including:4th receives mould
Block, the prompt message for receiving checking system transmission;5th sending module confirms access letter for being returned according to prompt message
Breath.
In embodiments of the present invention, pass through terminal and server, wherein terminal, for determining that data connection to be visited needs
Virtual Private Network is connected, data to be visited are verified by default verification mode, and sent to server according to verification result
Access request, wherein whether the authentication information that prestores that default verification mode is used to verify terminal meets access server
Standard;Network belonging to server is Virtual Private Network;Server is connect with terminal, the access for receiving terminal transmission
Request, and according to access request by the Virtual Private Network belonging to terminal access server, reached the mesh without password login VPN
, the technique effect for logging in efficiency is promoted to realize, and then solve due to the login that logging in VPN is brought in the prior art
The low technical problem of efficiency.
Description of the drawings
Attached drawing described herein is used to provide further understanding of the present invention, and is constituted part of this application, this hair
Bright illustrative embodiments and their description are not constituted improper limitations of the present invention for explaining the present invention.In the accompanying drawings:
Fig. 1 is the structural schematic diagram of the system of middle access network according to embodiments of the present invention;
Fig. 2 be according to embodiments of the present invention in it is a kind of access network system in first terminal access server belonging network
Flow interaction figure;
Fig. 3 is the affiliated net of first terminal access server in the middle another system for accessing network according to embodiments of the present invention
The flow interaction figure of network;
Fig. 4 be according to embodiments of the present invention in another access network system in first terminal from server belonging network
The flow interaction figure of disconnection;
Fig. 5 be according to embodiments of the present invention in a kind of method for realizing access network terminal it is (or mobile
Equipment) hardware block diagram;
Fig. 6 is the flow chart of the method for according to embodiments of the present invention two access network;
Fig. 7 is the flow chart of the method for according to embodiments of the present invention three access network;
Fig. 8 is the flow chart of the method for according to embodiments of the present invention four access network;
Fig. 9 is the flow chart of the method for according to embodiments of the present invention five access network;
Figure 10 is the flow chart of the method for according to embodiments of the present invention six access network;
Figure 11 is the structural schematic diagram of the device of according to embodiments of the present invention seven access network;
Figure 12 is the structural schematic diagram of the device of according to embodiments of the present invention eight access network;
Figure 13 is the structural schematic diagram of the device of according to embodiments of the present invention ten access network;
Figure 14 is the structural schematic diagram of the device of according to embodiments of the present invention 11 access network;
Figure 15 is the structural schematic diagram of the device of according to embodiments of the present invention 12 access network.
Specific implementation mode
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention
Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only
The embodiment of a part of the invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people
The every other embodiment that member is obtained without making creative work should all belong to the model that the present invention protects
It encloses.
It should be noted that term " first " in description and claims of this specification and above-mentioned attached drawing, "
Two " etc. be for distinguishing similar object, without being used to describe specific sequence or precedence.It should be appreciated that using in this way
Data can be interchanged in the appropriate case, so as to the embodiment of the present invention described herein can in addition to illustrating herein or
Sequence other than those of description is implemented.In addition, term " comprising " and " having " and their any deformation, it is intended that cover
It includes to be not necessarily limited to for example, containing the process of series of steps or unit, method, system, product or equipment to cover non-exclusive
Those of clearly list step or unit, but may include not listing clearly or for these processes, method, product
Or the other steps or unit that equipment is intrinsic.
First, the part noun or term occurred during the embodiment of the present application is described is suitable for following solution
It releases:
Virtual Private Network:Virtual Private Network, abbreviation VPN.
Embodiment 1
According to the application one embodiment, a kind of system embodiment of access network is provided, Fig. 1 is according to of the invention real
Apply the structural schematic diagram for the system that network is accessed in example.
As shown in Figure 1, the system of the access network includes:Terminal 12 and server 14, wherein
Terminal 12, for being used to determine that data connection to be visited to need to connect Virtual Private Network, by presetting authentication
Formula verifies data to be visited, and sends access request to server 14 according to verification result, wherein default verification mode is for testing
Whether the authentication information that prestores of card terminal 12 meets the standard of access server 14;Network belonging to server 14 is virtual
Dedicated network;Server 14 is connect with terminal 12, the access request for receiving the transmission of terminal 12, and will according to access request
Virtual Private Network belonging to 12 access server 14 of terminal.
Specifically, in the system of access network provided in this embodiment, terminal 12 detects whether data to be visited connect void
Internet resources in quasi- dedicated network, wherein the Internet resources may include:The IP address connected in data to be visited is corresponding
File, corresponding application program or corresponding file;For example, the corresponding hyperlink of list in the text that present terminal 12 is opened
The detailed data in the correspondence IP address in corresponding VPN network is connect, when detecting that the list in the text corresponds in the VPN network
Detailed data when, terminal 12 to server 14 send access request, wherein the access request carries the pre- of terminal 12 and takes shelter
Part verification information accesses the terminal 12 in the case where verifying the identity information that prestores and meeting the standard of access server 14
Virtual private network belonging to the server 14, that is, in order to avoid the mode of close input accesses VPN network, saved input and logged in account
Number, password and waiting system verification time, improve the efficiency handled official business into VPN network.
In the system of access network provided by the embodiments of the present application, pass through terminal and server, wherein terminal, for true
Fixed data connection to be visited needs to connect Virtual Private Network, verifies data to be visited by default verification mode, and foundation is tested
It demonstrate,proves result and sends access request to server, wherein presetting prestore authentication information of the verification mode for verifying terminal is
The no standard for meeting access server;Network belonging to server is Virtual Private Network;Server is connect with terminal, is used for
The access request that terminal is sent is received, and reaches the Virtual Private Network belonging to terminal access server according to access request
Purpose without password login VPN promotes the technique effect for logging in efficiency to realize, and then solves due to the prior art
The low technical problem of login efficiency that middle logging in VPN is brought.
Function in the system of access network provided by the embodiments of the present application in terminal 12 can pass through two ways reality
It is existing, it is as shown in Figures 2 and 3, specific as follows:
Scheme one:
Optionally, Fig. 2 be according to embodiments of the present invention in it is a kind of access network system in first terminal access server
The flow interaction figure of belonging network, as shown in Fig. 2, terminal 12 includes:First terminal 121 and second terminal 122, wherein
First terminal 121, for determining that data connection to be visited needs to connect the Internet resources in Virtual Private Network;And
Access authentication request is sent to second terminal 122, wherein access authentication is asked, and is used to indicate second terminal 122 and is recognized according to access
The authentication information that prestores in card request judges whether to confirm 121 access virtual private network of first terminal;The identity that prestores is tested
Demonstrate,proving information includes:Verify certificate;
Second terminal 122 is connect with first terminal 121, for receiving access authentication request, and whether detects verification certificate
It is matched with the verification signaling of access virtual private network;In the case where testing result is to be, returns and access to first terminal 121
Confirmation message, so that first terminal 121 sends access request according to access confirmation message to server 14.
Wherein, whether second terminal 122 with the verification signaling of access virtual private network matches it in detection verification certificate
Before, second terminal 122 receives the verification signaling that server 14 is sent, and the verification signaling can pass through the form of handset token here
It is sent to second terminal 122, wherein verification signaling is corresponding with the verification certificate that first terminal 121 prestores, that is, works as first terminal
Carry verification certificate in the 121 access authentications requests sent to second terminal 122, second terminal 122 and the verification certificate and
Verification signaling matches, and when successful match, surface first terminal 121 is proved to be successful.
Further, optionally, verification certificate includes:Account and password, account and password are for logging in Virtual Private Network
Network.
Specifically, as shown in Fig. 2, the function in the system of access network provided in this embodiment in terminal 12 can divide
It is realized for two terminals, that is, above-mentioned first terminal 121 and second terminal 122, wherein first terminal 121 and second terminal 122
Can be mobile terminal, which may include:Smart mobile phone (such as current application Android android system or IOS systems
Mobile phone, or the mobile phone of VPN network may be logged in), tablet computer, laptop, desktop computer, palm commercial affairs, intelligence wear
Equipment is worn (for example, enhancing virtual reality AR equipment (Augmented Reality), such as:Google glass, smartwatch etc. can
Network is accessed, the wearable device of VPN network is logged in).
First terminal 121 is with laptop or desktop computer in the system of access network provided in this embodiment
Example, by taking smart mobile phone as an example, Virtual Private Network is referred to as VPN network and illustrates second terminal 122, when user uses computer
When opening random procedure, run on the system detectio of current computer to the data storage location that the program connects be VPN network, this
When to smart mobile phone send access authentication request, access authentication request is to carry the request of default authentication information to disappear
Breath, wherein the authentication information that prestores includes:Certificate is verified, which can be that corresponding VPN network is installed on currently
The safety certificate of computer distribution, smart mobile phone are carried out according to the safety certificate and verification signaling in the VPN client of computer
Matching sends access confirmation message in the case of successful match to computer.
Wherein, smart mobile phone is matched according to the safety certificate with verification signaling, in the case of successful match, to electricity
Manifestation mode on smart mobile phone can be during brain sends access confirmation message:In data processing level, intelligence
Mobile phone is matched according to the safety certificate in access authentication request with the verification signaling on smart mobile phone, alternatively, receiving computer
The access authentication of transmission is asked, according to the verification certificate in the verification token authentication access authentication request on smart mobile phone;Aobvious
Show, after smart mobile phone receives the access authentication request of computer transmission, whether smart mobile phone display reminding information, display " connects
Enter VPN network" in the case where user selects to confirm, access confirmation message is returned into computer, and then computer accesses VPN network.
What needs to be explained here is that the verification process on smart mobile phone can be enabled by an application APP with mobile phone
The access authentication request that the formal verification computer of board is sent, wherein the handset token can be a random array, for verifying
The access authentication is asked, and the application does not limit the process for the access authentication request that smart mobile phone verification computer is sent, to realize this
Subject to the system for applying for the access network that embodiment provides, do not limit specifically.
Wherein, when first terminal 121 is tablet computer or smart mobile phone, realization method is identical as computer realization method,
Difference lies according to the corresponding VPN client of different terminals type installation, do not repeat specifically.
Scheme two:
Optionally, first terminal access service in the system of another access network during Fig. 3 is according to embodiments of the present invention
The flow interaction figure of device belonging network, as shown in figure 3, first terminal 121 includes:Custom system 1211 and checking system 1212,
Wherein,
Checking system 1212, for being used to detect whether data to be visited in custom system 1211 to connect Virtual Private Network
In Internet resources;And send prompt message to custom system 1211, wherein prompt message, which is used to indicate custom system 1211, is
No access virtual private network;
Custom system 1211 is connect with checking system 1212, is returned really for receiving prompt message, and according to prompt message
Recognize access information;
Checking system 1212, is additionally operable to according to the confirmation access information received, and access authentication is sent to second terminal 122
Request.
Specifically, as shown in figure 3, be different from scheme one, in scheme two in first terminal 121, pass through custom system
1211 and checking system 1212 execute corresponding function respectively, for example, custom system 1211 open A apply (or A texts),
In, checking system 1212 detects that the source data in A applications is mapped in the Internet resources in VPN network, needs to access VPN nets
Network, thus checking system 1212 to custom system 1211 send prompt message, custom system 1211 show the prompt message and by
To the instruction for confirming access, custom system 1211 is generated according to the instruction confirms access information, and checking system 1212 is true according to this
Recognize access information, the confirmation access information is sent to second terminal 122, so that the secondary verification by second terminal 122,
VPN network belonging to access server 14.
Optionally, during Fig. 4 is according to embodiments of the present invention in the system of another access network first terminal from server
The flow interaction figure that belonging network disconnects, as shown in figure 4, first terminal 121 is additionally operable to after access virtual private network,
In preset time section, detection first terminal 121 is with the presence or absence of the operation to Virtual Private Network request data, in testing result
In the case of no, judge whether current sensing time is greater than or equal to the upper limit threshold in preset time section, in judging result
In the case of being, request is disconnected to Virtual Private Network transmission, wherein disconnect request, be used to indicate server
14 disconnect the link of 121 access virtual private network of first terminal.
Specifically, as shown in figure 4, after first terminal 121 accesses VPN network, first terminal 121 enters similar " prison
Listen " pattern, wherein setting preset time section, that is, if not detecting first terminal 121 in the preset time section
Operation to Virtual Private Network request data will send to Virtual Private Network and disconnect request, so that server 14
Disconnect the link of 121 access virtual private network of first terminal.
Optionally, second terminal 122 includes:Mobile terminal;Wherein, mobile terminal, for receiving access authentication request, and
Verified according to the verification array to prestore in the verification certificate and mobile terminal that carry in access authentication request, verify at
In the case of work(, access confirmation message is returned to first terminal 121.
Specifically, as shown in Figures 2 and 3, second terminal 122 can be mobile terminal, be connect by the mobile terminal
Enter certification request, and the verification array to prestore in the verification certificate and mobile terminal carried in being asked according to access authentication carries out
Verification returns to access confirmation message in the case where being proved to be successful to first terminal 121.
Optionally, as shown in figure 4, server 14, is additionally operable to receive the request that disconnects of the transmission of first terminal 121, and
According to breaking connection request, 121 access virtual private network of first terminal is cut off.
Specifically, as shown in figure 4, after the transmission of first terminal 121 disconnects request, server 14 receives the disconnection and connects
Request is connect, and request is disconnected according to this, cuts off 121 access virtual private network of first terminal.
In addition, after first terminal 121 and VPN network disconnect, if user needs again to access first terminal 121
VPN, then execute re-execute 121 certification of above-mentioned first terminal and first terminal 121 carried out by second terminal 122 it is secondary
After certification, access request, and the process of the VPN belonging to access server 14 are sent to server 14.
The system of access network provided in this embodiment can make user exempt from close high safety to automatically access company Intranet method,
When user actively accesses Intranet resource, actively prompt the user whether to need to access Intranet, if the user determine that needing in access
Net, then can push a notice to the token mobile phone of user's registration carries out secondary-confirmation, carrying out VPN on backstage later dials in,
Entire access procedure is fully transparent, unaware for a user.After user's access network-free network demand several minutes,
Intranet connection is actively disconnected, has ensured the information security in VPN network.
Embodiment 2
According to another embodiment of the present invention, a kind of embodiment of the method for access network is additionally provided, it should be noted that
The step of flow of attached drawing illustrates can execute in the computer system of such as a group of computer-executable instructions, also,
It, in some cases, can be with different from shown in sequence execution herein although logical order is shown in flow charts
The step of going out or describing.
The embodiment of the method that the embodiment of the present application one is provided can be in mobile terminal, terminal or similar fortune
It calculates and is executed in device.Fig. 5 be according to embodiments of the present invention in it is a kind of for realizing access network method terminal (or
Mobile device) hardware block diagram.As shown in figure 5, terminal 50 (or mobile device 50) may include one or more
A (502a, 502b ... ..., 502n is used to show in figure) (processor 502 can include but is not limited to micro- place to processor 502
Manage the processing unit of device MCU or programmable logic device FPGA etc.), memory 504 for storing data and for communicating
The transmission module 506 of function.In addition to this, can also include:Display, input/output interface (I/O interfaces), general serial
Port bus (USB) (can as a port in the port of I/O interfaces by including), network interface, power supply and/or phase
Machine.It will appreciated by the skilled person that structure shown in fig. 5 is only to illustrate, not to the knot of above-mentioned electronic device
It is configured to limit.For example, terminal 50 may also include than shown in Fig. 5 more either less components or with
Different configuration shown in Fig. 5.
It is to be noted that said one or multiple processors 502 and/or other data processing circuits lead to herein
Can often it be referred to as " data processing circuit ".The data processing circuit all or part of can be presented as software, hardware, firmware
Or any other combination.In addition, data processing circuit can be single independent processing module or all or part of be attached to meter
In any one in other elements in calculation machine terminal 50 (or mobile device).As involved in the embodiment of the present application,
The data processing circuit controls (such as the selection for the variable resistance end path being connect with interface) as a kind of processor.
Memory 504 can be used for storing the software program and module of application software, such as the access in the embodiment of the present invention
Corresponding program instruction/the data storage device of method of network, processor 502 are stored in soft in memory 504 by operation
Part program and module realize the loophole inspection of above-mentioned application program to perform various functions application and data processing
Survey method.Memory 504 may include high speed random access memory, may also include nonvolatile memory, such as one or more magnetic
Property storage device, flash memory or other non-volatile solid state memories.In some instances, memory 504 can further comprise
The memory remotely located relative to processor 502, these remote memories can pass through network connection to terminal 50.
The example of above-mentioned network includes but not limited to internet, intranet, LAN, mobile radio communication and combinations thereof.
Transmitting device 506 is used to receive via a network or transmission data.Above-mentioned network specific example may include
The wireless network that the communication providers of terminal 50 provide.In an example, transmitting device 506 includes that a network is suitable
Orchestration (Network Interface Controller, NIC), can be connected with other network equipments by base station so as to
Internet is communicated.In an example, transmitting device 506 can be radio frequency (Radio Frequency, RF) module,
For wirelessly being communicated with internet.
Display can such as touch-screen type liquid crystal display (LCD), which may make that user can be with
The user interface of terminal 50 (or mobile device) interacts.
Under above-mentioned running environment, this application provides the methods of access network as shown in FIG. 6.In first terminal side,
Fig. 6 is the flow chart of the method for according to embodiments of the present invention two access network.
Step S602, first terminal determine that data connection to be visited needs to access Virtual Private Network;
In the application above-mentioned steps S602, the first terminal 121 in corresponding embodiment 1 in Fig. 2 and Fig. 3, first terminal 121
Whether the data of detection current accessed connect the Internet resources in Virtual Private Network.
Specifically, first terminal 121 is with laptop or desk-top in the method for access network provided in this embodiment
Illustrated for computer, when user opens random procedure using computer, run on the system of current computer to the data into
Whether row detection, the data storage location for detecting program connection are derived from VPN network.
Step S604, first terminal send access authentication request to second terminal, wherein access authentication is asked, for referring to
Show prestore authentication information of the second terminal according to the first terminal carried in access authentication request, judges whether confirmation first
Terminal for accessing virtual dedicated network;
It is program connection in testing result in the application above-mentioned steps S604 based on the detection in above-mentioned steps S602
Data storage location whether be derived from VPN network, at this time first terminal to second terminal send access authentication request.
Step S606, first terminal receive the access confirmation message that second terminal is returned according to access authentication request;
It is asked based on the access authentication sent in above-mentioned steps S604, in the application above-mentioned steps S606, first terminal connects
Receive the access confirmation message that second terminal is returned according to access authentication request, wherein the access confirmation message is used to indicate the
One terminal is proved to be successful in the secondary of second terminal, can access VPN network.
Step S608, first terminal is according to the Virtual Private Network belonging to access confirmation message access server.
Based on the access confirmation message received in step S606, in the application above-mentioned steps S602, first terminal foundation
Network belonging to the access confirmation message access server.
In the method for access network provided by the embodiments of the present application, determine that data connection to be visited needs by first terminal
Access Virtual Private Network;First terminal sends access authentication request to second terminal, wherein access authentication is asked, and is used for
Second terminal is indicated according to the authentication information that prestores of first terminal carried in access authentication request, judges whether confirmation the
One terminal for accessing virtual dedicated network;First terminal receives the access confirmation letter that second terminal is returned according to access authentication request
Breath;First terminal has reached according to the Virtual Private Network belonging to access confirmation message access server without password login VPN's
Purpose promotes the technique effect for logging in efficiency to realize, and then solves since what logging in VPN in the prior art was brought steps on
Record the low technical problem of efficiency.
Optionally, first terminal determines that data connection to be visited needs to access Virtual Private Network packet in step S602
It includes:
Step1, first terminal parse the data of current accessed, obtain the target access information in data, wherein target is visited
Ask that information includes:At least one of the access identities carried in path address, Internet protocol address or data;
In the application above-mentioned steps Step1, whether the data that current accessed how is detected in first terminal connect virtually specially
During with the Internet resources in network, firstly, it is necessary to parse the data of the current accessed, the target obtained in the data is visited
Ask information, that is, in embodiment 1 in Fig. 3, the checking system in first terminal parses data to be visited, obtains and is connected in the data
Routing information (that is, target access information in the embodiment of the present application) whether connect the Internet resources in VPN.
What needs to be explained here is that the target access information in the embodiment of the present application includes:Path address, Internet protocol
At least one of the access identities carried in address or data, for example, being connected to a text in VPN network in data to be visited
Part presss from both sides path, Ke Yiru:" 200.200.X.XX/ file A/ sub-folders 1 ";Alternatively, carrying VPN in the data to be visited
The IP address of network;Alternatively, storing a check list in first terminal, it is local that each first terminal is stored in the list
The feature group cluster connected in data and VPN network, this feature group cluster are according to every group of local data in this feature group cluster
It is formed with the access identities that the resource path information of corresponding VPN network generates.
Step2, first terminal match target access information with the access data list that prestores, and judge that target access is believed
Whether breath matches with the mark for accessing access virtual private network in data list that prestores.
Based on the target access information that above-mentioned steps Step1 is obtained, visited according to the target in the application above-mentioned steps Step2
It asks that information is matched with the access data list that prestores, judges whether the target access information connects with the access data list that prestores
Enter the mark matching of Virtual Private Network.
Further, optionally, in the Step2 in step S602 first terminal judge target access information whether in advance
After depositing the mark matching for accessing access virtual private network in data list, first terminal is sent out to second terminal in step S604
Send access authentication request include:
Step1, in the case where the judgment result is yes, first terminal display reminding information, wherein prompt message is for referring to
Show user whether access virtual private network;
It is that target access information connects with the access data list that prestores in judging result in the application above-mentioned steps Step1
Enter Virtual Private Network mark it is matched in the case of, first terminal display reminding information, Fig. 3 is corresponding in corresponding embodiment 1
Embodiment, the mark of checking system access virtual private network in detection target access information and the access data list that prestores
It in the case of matched, is detected successfully to custom system feedback, and by custom system display reminding information, the prompt message is for carrying
Whether awake user accesses VPN network.
Step2, first terminal, which receives, confirms incoming instruction, wherein confirms incoming instruction, is used to indicate first terminal confirmation
Access virtual private network;
Based on the prompt message shown in above-mentioned steps Step1, the use in the application above-mentioned steps Step2 in first terminal
Family system receives the trigger action that user confirms the icon or button that access by touching, the confirmation generated according to the trigger action
Incoming instruction.
Step3, first terminal send access authentication request according to confirmation incoming instruction to second terminal.
Based on the confirmation incoming instruction that above-mentioned steps Step2 is received, in the application above-mentioned steps Step3, first terminal according to
According to the confirmation incoming instruction access authentication request is sent to second terminal.
Optionally, the first terminal in step S608 is according to the Virtual Private Network belonging to access confirmation message access server
Network includes:
Step1, in the case where accessing the verification signaling of confirmation message carrying second terminal, first terminal is believed according to verification
The authentication information that enables and prestore generates access request;
In the application above-mentioned steps Step1, the authentication information that prestores be may include verification certificate in first terminal
(for example, safety certificate), first terminal is in the case where receiving the confirmation message for the verification signaling for carrying second terminal, knot
The verification signaling carried in the access confirmation message that second terminal is sent and verification certificate are closed, access request is generated.
Step2, first terminal send access request to server.
Based on the access request generated in above-mentioned steps Step1, in the application above-mentioned steps Step2, first terminal is to clothes
Business device sends the access request.
Further, optionally, the authentication information that prestores includes:Verify certificate, wherein verifying certificate includes:Account
And password, account and password are for logging in Virtual Private Network.
Optionally, the method for access network provided in this embodiment further includes:
Step S609, after first terminal access virtual private network, in preset time section, first terminal detection
With the presence or absence of the operation to Virtual Private Network request data;
In the application above-mentioned steps S609, belonging to step S602 to step S608 first terminal access servers
VPN network, after first terminal 121 accesses VPN network, first terminal 121 enters similar " monitoring " pattern, wherein setting
Preset time section, that is, if not detecting that first terminal 121 is asked to Virtual Private Network in the preset time section
The operation of data.
Step S610, in the case where testing result is no, first terminal judges whether current sensing time is more than or waits
Upper limit threshold in preset time section;
It is first terminal inspection in testing result in the application above-mentioned steps S610 based on the detection in above-mentioned steps S609
In the case of surveying there is no the operation to Virtual Private Network request data, it is pre- to judge whether current sensing time is greater than or equal to
If the upper limit threshold of time interval;Here judge whether current sensing time is greater than or equal to the upper limit threshold in preset time section
Value, for judging that current first terminal access VPN whether there is timeout case, that is, user leaves first terminal, pauses at first
Manual operation in terminal can be used as by the detection of step S609 and step S610 and ensure sentencing before VPN network safety
Disconnected evaluation condition.
Step S611, in the case where the judgment result is yes, first terminal are disconnected to Virtual Private Network transmission and are asked
It asks, wherein disconnect request, be used to indicate the link that server disconnects first terminal access virtual private network.
Based on the judgement in above-mentioned steps S610, in the application above-mentioned steps S611, sentence for first terminal in judging result
In the case that disconnected current sensing time is greater than or equal to the upper limit threshold in preset time section, first terminal is sent to VPN network
Disconnect request.To disconnect the link between VPN network.
The method of access network provided in this embodiment can make user exempt from close high safety to automatically access company Intranet, with
When householder moves access Intranet resource, actively prompt the user whether to need to access Intranet, if the user determine that need to access Intranet, that
A notice can be pushed to the token mobile phone of user's registration and carries out secondary-confirmation, and carrying out VPN on backstage later dials in, and entirely connects
It is fully transparent, unaware to enter process for a user.It is actively disconnected after user's access network-free network demand several minutes
Open Intranet connection.
Embodiment 3
This application provides the methods of access network as shown in Figure 7.In second terminal side, Fig. 7 is according to of the invention real
Apply the flow chart of the method for the access network of example three.
Step S702, second terminal receive the access authentication request that first terminal is sent;
In the application above-mentioned steps S702, based on the system of the access networks provided of Fig. 1 to Fig. 3 in embodiment 1, in conjunction with reality
The method for applying the access network that first terminal side in example 2 provides, the embodiment of the present application receive first terminal hair in second terminal side
The access authentication request sent, wherein access authentication request is used to indicate second terminal according to being carried in access authentication request
The authentication information that prestores of first terminal judges whether to confirm first terminal access virtual private network;Judgment step is shown in step
Rapid S704.
Step S704, prestore authentication information of the second terminal according to the first terminal carried in access authentication request,
Judge whether to confirm first terminal access virtual private network;
It is asked based on the access authentication received in step S702, in the application above-mentioned steps S704, second terminal foundation connects
The authentication information that prestores for entering the first terminal carried in certification request judges whether to confirm that first terminal access of virtual is special
Network.
Step S706, in the case where the judgment result is yes, second terminal send access confirmation message to first terminal.
It is to confirm that first terminal connects in judging result in the application above-mentioned steps S706 based on the judgement in step S704
In the case of entering Virtual Private Network, second terminal sends access confirmation message to first terminal.
In the method for access network provided by the embodiments of the present application, the access that first terminal is sent is received by second terminal
Certification request;Prestore authentication information of the second terminal according to the first terminal carried in access authentication request, judges whether
Confirm first terminal access virtual private network;In the case where the judgment result is yes, second terminal connects to first terminal transmission
Enter confirmation message, achieved the purpose that without password login VPN, promotes the technique effect for logging in efficiency to realize, and then solve
It has determined due to the low technical problem of logging in VPN is brought in the prior art login efficiency.
Optionally, second terminal is tested according to the identity that prestores of the first terminal carried in access authentication request in step S704
Information is demonstrate,proved, judges whether to confirm that first terminal access virtual private network includes:
Step1, the authentication information that prestores of the first terminal carried in second terminal parsing access authentication request, obtains
The verification certificate to prestore in identity information, wherein verification certificate includes:Account and password, account and password are virtual for logging in
Dedicated network;
In the application above-mentioned steps Step1, the in the system of the access network provided in Fig. 2 and Fig. 3 in corresponding embodiment 1
Two terminal parts, the authentication information that prestores of the first terminal carried in second terminal parsing access authentication request, obtain pre-
Deposit the verification certificate in identity information, wherein verifying certificate includes:Account and password, account and password are virtual special for logging in
Use network.
Whether Step2, second terminal detection verification certificate match with the verification signaling of access virtual private network, wherein
It is pre-stored verification array in second terminal to verify signaling.
Based on the judgement in step Step1, in the application above-mentioned steps Step2, whether second terminal detection verification certificate
It is matched with the verification signaling of access virtual private network.
Specifically, in conjunction with above-mentioned steps Step1 and Step2, in second terminal side, second terminal can pass through handset token
Mode access authentication request that first terminal is sent carry out secondary verification, wherein handset token is verified, can be by the
The application program that two terminals install network access security verification class realizes that the method for access network provided by the embodiments of the present application is only
It is illustrated in the way of handset token, is subject to and realizes the method provided by the embodiments of the present application for accessing network, specifically
It does not limit.
Embodiment 4
This application provides the methods of access network as shown in Figure 8.In server side, Fig. 8 is implemented according to the present invention
The flow chart of the method for the access network of example four.
Step S802, server receive the access request that first terminal is sent;
In the application above-mentioned steps S802, based on the system of the access networks provided of Fig. 1 to Fig. 3 in embodiment 1, in conjunction with reality
Apply the access network that second terminal side provides in the method for accessing network and embodiment 3 that first terminal side in example 2 provides
Method, the embodiment of the present application receive the access request that first terminal is sent in server side, server.
Step S804, server is according to access request by the Virtual Private Network belonging to first terminal access server.
Based on the access request that server in step S802 receives, in the application above-mentioned steps S804, server is according to connecing
Enter request by the Virtual Private Network belonging to first terminal access server.
In the method for access network provided by the embodiments of the present application, the access that first terminal is sent is received by server and is asked
It asks;Server has reached the Virtual Private Network belonging to first terminal access server without password login according to access request
The purpose of VPN promotes the technique effect for logging in efficiency to realize, and then solves due to logging in VPN band in the prior art
The low technical problem of next login efficiency.
Optionally, in step S804 server according to access request by the virtual private belonging to first terminal access server
Network includes:
Step1, parse access request, obtain access request in carry first terminal prestore authentication information and
The verification signaling of second terminal;
Step2 is verified and is prestored authentication information and verify whether signaling meets default access standard;
Step3, in the case where check results are to be, server is by the virtual private belonging to first terminal access server
Network.
Specifically, in conjunction with step Step1 to step Step3, server is obtained by parsing access request in access request
The verification signaling of prestore authentication information and the second terminal of the first terminal of carrying;Verification prestore authentication information and
Whether verification signaling meets default access standard;In the case where check results are to be, server is by first terminal access service
Virtual Private Network belonging to device.
In addition, in addition to the process of above-mentioned server authentication, after server receives access request, server can be with
Directly by the VPN network belonging to first terminal access, verification process is reduced with this, first terminal is saved and accesses the VPN network time,
Promote access efficiency.
Optionally, the method for access network provided by the embodiments of the present application further includes:
Step S805, receive first terminal transmission disconnects request;
Step S806 cuts off first terminal access virtual private network according to breaking connection request.
Specifically, in conjunction with step S805 and step S806, based on Fig. 4 in embodiment 1, server receives first terminal hair
That send disconnects request, and after disconnecting request receive that first terminal sends, according to breaking connection request, cut-out
First terminal access virtual private network.
Embodiment 5
This application provides the methods of access network as shown in Figure 9.In the checking system side of first terminal, Fig. 9 is root
According to the flow chart of the method for the access network of the embodiment of the present invention five.
Step S902, detects whether data to be visited in custom system connect the Internet resources in Virtual Private Network;
In the application above-mentioned steps S902, the system for the access network that Fig. 3 is provided in corresponding embodiment 1, the application is implemented
Whether example data to be visited in the checking system side of first terminal, checking system detection custom system connect Virtual Private Network
In Internet resources.
Step S904 sends prompt message, wherein prompt message in the case where testing result is to be to custom system
Be used to indicate custom system whether access virtual private network;
Based on the detection of step S902, in the application above-mentioned steps S904, waited in testing result is detection custom system
In the case of accessing the Internet resources in data connection Virtual Private Network, checking system sends prompt message to custom system,
Wherein, prompt message be used to indicate custom system whether access virtual private network.
Step S906 sends access to second terminal and recognizes according to the confirmation access information that the custom system received returns
Card request.
Based on the prompt message that step S904 is sent, in the application above-mentioned steps S906, checking system is according to receiving
The confirmation access information that custom system returns sends access authentication request to second terminal.
In the method for access network provided by the embodiments of the present application, by detecting whether data to be visited in custom system connect
Connect the Internet resources in Virtual Private Network;In the case where testing result is to be, prompt message is sent to custom system,
In, prompt message be used to indicate custom system whether access virtual private network;It is returned really according to the custom system received
Recognize access information, sends access authentication request to second terminal, achieved the purpose that, without password login VPN, to carry to realize
The technique effect for logging in efficiency is risen, and then is solved since the low technology of logging in VPN is brought in the prior art login efficiency is asked
Topic.
Embodiment 6
This application provides the methods of access network as shown in Figure 10.In the custom system side of first terminal, Tu10Shi
The flow chart of the method for according to embodiments of the present invention six access network.
Step S1002 receives the prompt message that checking system is sent;
In the application above-mentioned steps S1002, the system for the access network that Fig. 3 is provided in corresponding embodiment 1, the application is implemented
Example receives the prompt message that checking system is sent in the custom system side of first terminal, custom system.
Step S1004 is returned according to prompt message and is confirmed access information.
Based on the prompt message that step S1002 is received, in the application above-mentioned steps S1004, custom system is believed according to prompt
Breath, which returns, confirms access information.
In the method for access network provided by the embodiments of the present application, by the prompt message for receiving checking system transmission;According to
It is returned according to prompt message and confirms access information, achieved the purpose that without password login VPN, efficiency is logged in realize to be promoted
Technique effect, and then solve due to the low technical problem of logging in VPN is brought in the prior art login efficiency.
To sum up, the system based on the access network provided in embodiment 1, in conjunction with the embodiments 2 to embodiment 6 access provided
The method of the method for network, access network provided by the embodiments of the present application is specific as follows:
Detection access company Intranet demand, prompts the user whether in the method for access network provided by the embodiments of the present application
Company Intranet is accessed, token mobile phone secondary-confirmation accesses company Intranet, and no Intranet requirements for access disconnects Intranet connection, specific to flow
Journey is as follows:
(1) hook is carried out to socket data in system level, the main purpose of hook is to confirm whether access address is public
Take charge of internal address;
(2) after detecting company Intranet access network request, user is prompted;
(3) user's confirmation needs after accessing company Intranet, and user is prompted to carry out token mobile phone secondary-confirmation;
(4) it after user completes two-factor authentication, dials VPN on backstage and accesses company Intranet;
(5) hook of the socket of system level actively disconnects VPN connections, protection company Intranet money upon timing-out
Source.
The method of access network provided by the embodiments of the present application can make user exempt from close high safety to automatically access company Intranet,
When user actively accesses Intranet resource, actively prompt the user whether to need to access Intranet, if the user determine that needing in access
Net, then can push a notice to the token mobile phone of user's registration carries out secondary-confirmation, carrying out VPN on backstage later dials in,
Entire access procedure is fully transparent, unaware for a user.After user's access network-free network demand several minutes,
Actively disconnect Intranet connection.
The method of access network provided by the embodiments of the present application can pass through actively under the premise of ensureing dual factors safety
It prompts user to access Intranet, and promotes the sign-in experience of user, save user's login time cost;Protect Intranet resource simultaneously.
It should be noted that for each method embodiment above-mentioned, for simple description, therefore it is all expressed as a series of
Combination of actions, but those skilled in the art should understand that, the present invention is not limited by the described action sequence because
According to the present invention, certain steps can be performed in other orders or simultaneously.Secondly, those skilled in the art should also know
It knows, embodiment described in this description belongs to preferred embodiment, and involved action and module are not necessarily of the invention
It is necessary.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation
The method of the access network of example can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hard
Part, but the former is more preferably embodiment in many cases.Based on this understanding, technical scheme of the present invention substantially or
Say that the part that contributes to existing technology can be expressed in the form of software products, which is stored in
In one storage medium (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal equipment (can be hand
Machine, computer, server or network equipment etc.) execute method described in each embodiment of the present invention.
Embodiment 7
According to the embodiment of the present application, it is real to additionally provide a kind of device for implementing two corresponding embodiment of the method for embodiment
Example is applied, the device that the above embodiments of the present application are provided can be run on first terminal.
Figure 11 is the structural schematic diagram of the device of according to embodiments of the present invention seven access network.
As shown in figure 11, the device of the access network includes:First detection module 1102, the first sending module 1104,
One receiving module 1106 and the first AM access module 1108, wherein
First detection module 1102, for determining that data connection to be visited needs to access Virtual Private Network;First hair
Module 1104 is sent, for sending access authentication request to second terminal, wherein access authentication is asked, and second terminal is used to indicate
According to the authentication information that prestores of the first terminal carried in access authentication request, judge whether to confirm that first terminal access is empty
Quasi- dedicated network;First receiving module 1106, the access confirmation letter returned according to access authentication request for receiving second terminal
Breath;First AM access module 1108, for according to the Virtual Private Network belonging to access confirmation message access server.
In the device of access network provided by the embodiments of the present application, determine that data connection to be visited needs by first terminal
Access Virtual Private Network;First terminal sends access authentication request to second terminal, wherein access authentication is asked, and is used for
Second terminal is indicated according to the authentication information that prestores of first terminal carried in access authentication request, judges whether confirmation the
One terminal for accessing virtual dedicated network;First terminal receives the access confirmation letter that second terminal is returned according to access authentication request
Breath;First terminal has reached according to the Virtual Private Network belonging to access confirmation message access server without password login VPN's
Purpose promotes the technique effect for logging in efficiency to realize, and then solves since what logging in VPN in the prior art was brought steps on
Record the low technical problem of efficiency.
Herein it should be noted that above-mentioned first detection module 1102, the first sending module 1104, the first receiving module
1106 and first AM access module 1108 correspond to the step S602 to step S608 in embodiment two, four modules and corresponding step
Suddenly the example realized is identical with application scenarios, but is not limited to the above embodiments two disclosure of that.On it should be noted that
State module as a part for device may operate in embodiment two offer first terminal in, can by software realization,
Hardware realization can be passed through.
Embodiment 8
According to the embodiment of the present application, it is real to additionally provide a kind of device for implementing three corresponding embodiment of the method for embodiment
Example is applied, the device that the above embodiments of the present application are provided can be run in second terminal.
Figure 12 is the structural schematic diagram of the device of according to embodiments of the present invention eight access network.
As shown in figure 12, the device of the access network includes:Second receiving module 1202, the first authentication module 1204 and
Two sending modules 1206, wherein
Second receiving module 1202, the access authentication request for receiving first terminal transmission;First authentication module 1204,
For the authentication information that prestores according to the first terminal carried in access authentication request, judge whether to confirm that first terminal connects
Enter Virtual Private Network;Second sending module 1206, in the case where the judgment result is yes, sending and accessing to first terminal
Confirmation message.
In the device of access network provided by the embodiments of the present application, the access that first terminal is sent is received by second terminal
Certification request;Prestore authentication information of the second terminal according to the first terminal carried in access authentication request, judges whether
Confirm first terminal access virtual private network;In the case where the judgment result is yes, second terminal connects to first terminal transmission
Enter confirmation message, achieved the purpose that without password login VPN, promotes the technique effect for logging in efficiency to realize, and then solve
It has determined due to the low technical problem of logging in VPN is brought in the prior art login efficiency.
Herein it should be noted that above-mentioned second receiving module 1202, the first authentication module 1204 and the second sending module
1206 correspond to the step S702 to step S706 in embodiment three, the example and answer that three modules and corresponding step are realized
It is identical with scene, but it is not limited to the above embodiments three disclosure of that.It should be noted that above-mentioned module as device one
Part may operate in the second terminal of the offer of embodiment three, can also pass through hardware realization by software realization.
Embodiment 9
According to the embodiment of the present application, a kind of Intelligent hardware embodiment is additionally provided, what the above embodiments of the present application were provided
Intelligent hardware can be run in second terminal.The Intelligent hardware, including:Transmitter/receivers, processor, memory and display screen,
In, transmitter/receivers, the access authentication request for receiving first terminal transmission;Processor is connect with transmitter/receivers, is connect for foundation
The authentication information that prestores for entering the first terminal carried in certification request judges whether to confirm that first terminal access of virtual is special
Network, wherein processor is by calling the verification signaling stored in memory to judge whether to confirm that first terminal access of virtual is special
With network, and judging result is shown by display screen;Transmitter/receivers is additionally operable in the case where the judgment result is yes, eventually to first
End sends access confirmation message.
In the device of access network provided by the embodiments of the present application, by transmitter/receivers, for receiving first terminal transmission
Access authentication is asked;Processor is connect with transmitter/receivers, for prestoring according to the first terminal carried in access authentication request
Authentication information judges whether to confirm first terminal access virtual private network, wherein processor is by calling in memory
The verification signaling of storage judges whether to confirm first terminal access virtual private network, and shows judging result by display screen;
Transmitter/receivers, is additionally operable in the case where the judgment result is yes, sends access confirmation message to first terminal, has reached without password
The purpose of logging in VPN promotes the technique effect for logging in efficiency to realize, and then solves due to logging in the prior art
The low technical problem of login efficiency that VPN is brought.
Embodiment 10
According to the embodiment of the present application, it is real to additionally provide a kind of device for implementing the corresponding embodiment of the method for example IV
Example is applied, the device that the above embodiments of the present application are provided can be run on the server.
Figure 13 is the structural schematic diagram of the device of according to embodiments of the present invention ten access network.
As shown in figure 13, the device of the access network includes:Third receiving module 1302 and the second AM access module 1304,
In,
Third receiving module 1302, the access request for receiving first terminal transmission;Second AM access module 1304, is used for
According to access request by the Virtual Private Network belonging to first terminal access server.
In the device of access network provided by the embodiments of the present application, the access that first terminal is sent is received by server and is asked
It asks;Server has reached the Virtual Private Network belonging to first terminal access server without password login according to access request
The purpose of VPN promotes the technique effect for logging in efficiency to realize, and then solves due to logging in VPN band in the prior art
The low technical problem of next login efficiency.
Herein it should be noted that 1302 and second AM access module 1304 of above-mentioned third receiving module corresponds to embodiment three
In step S802 to step S804, the example and application scenarios that two modules and corresponding step are realized be identical but unlimited
In four disclosure of that of above-described embodiment.It should be noted that above-mentioned module may operate in reality as a part for device
In the server that the offer of example four is provided, it can also pass through hardware realization by software realization.
Embodiment 11
According to the embodiment of the present application, it is real to additionally provide a kind of device for implementing five corresponding embodiment of the method for embodiment
Example is applied, the device that the above embodiments of the present application are provided can be run in the checking system of first terminal.
Figure 14 is the structural schematic diagram of the device of according to embodiments of the present invention 11 access network.
As shown in figure 14, the device of the access network includes:Second detection module 1402, third sending module 1404 and
Four sending modules 1406, wherein
Second detection module 1402, for detecting whether data to be visited in custom system connect in Virtual Private Network
Internet resources;Third sending module 1404, in the case where testing result is to be, prompt message to be sent to custom system,
Wherein, prompt message be used to indicate custom system whether access virtual private network;4th sending module 1406, foundation receive
Custom system return confirmation access information, to second terminal send access authentication request.
In the device of access network provided by the embodiments of the present application, by detecting whether data to be visited in custom system connect
Connect the Internet resources in Virtual Private Network;In the case where testing result is to be, prompt message is sent to custom system,
In, prompt message be used to indicate custom system whether access virtual private network;It is returned really according to the custom system received
Recognize access information, sends access authentication request to second terminal, achieved the purpose that, without password login VPN, to carry to realize
The technique effect for logging in efficiency is risen, and then is solved since the low technology of logging in VPN is brought in the prior art login efficiency is asked
Topic.
Herein it should be noted that above-mentioned second detection module 1402, third sending module 1404 and the 4th sending module
1406 correspond to the step S902 to step S906 in embodiment five, the example and answer that three modules and corresponding step are realized
It is identical with scene, but it is not limited to the above embodiments five disclosure of that.It should be noted that above-mentioned module as device one
Part may operate in the checking system of the first terminal of the offer of embodiment five, can also be passed through by software realization
Hardware realization.
Embodiment 12
According to the embodiment of the present application, it is real to additionally provide a kind of device for implementing six corresponding embodiment of the method for embodiment
Example is applied, the device that the above embodiments of the present application are provided can be run in the checking system of first terminal.
Figure 15 is the structural schematic diagram of the device of according to embodiments of the present invention 12 access network.
As shown in figure 15, the device of the access network includes:4th receiving module 1502 and the 5th sending module 1504,
In,
4th receiving module 1502, the prompt message for receiving checking system transmission;5th sending module 1504, is used for
It is returned according to prompt message and confirms access information.
In the device of access network provided by the embodiments of the present application, by the prompt message for receiving checking system transmission;According to
It is returned according to prompt message and confirms access information, achieved the purpose that without password login VPN, efficiency is logged in realize to be promoted
Technique effect, and then solve due to the low technical problem of logging in VPN is brought in the prior art login efficiency.
Herein it should be noted that above-mentioned 4th receiving module 1502 and the 5th sending module 1504 correspond to embodiment five
In step S1002 to step S1004, two modules are identical as example and application scenarios that corresponding step is realized, but not
It is limited to six disclosure of that of above-described embodiment.It should be noted that above-mentioned module may operate in as a part for device
In the custom system for the first terminal that embodiment six provides, it can also pass through hardware realization by software realization.
Embodiment 13
The embodiments of the present invention also provide a kind of storage mediums.Optionally, in the present embodiment, above-mentioned storage medium can
For preserving the program code performed by the method for the access network that above-described embodiment one is provided.
Optionally, in the present embodiment, above-mentioned storage medium can be located in computer network Computer terminal group
In any one terminal, or in any one mobile terminal in mobile terminal group.
Optionally, in the present embodiment, storage medium is arranged to store the program code for executing following steps:Really
Fixed data connection to be visited needs to access Virtual Private Network;Access authentication request is sent to second terminal, wherein access is recognized
Card request is used to indicate prestore authentication information of the second terminal according to the first terminal carried in access authentication request, sentences
It is disconnected whether to confirm first terminal access virtual private network;The access that second terminal is returned according to access authentication request is received to confirm
Information;According to the Virtual Private Network belonging to access confirmation message access server.
Optionally, in the present embodiment, storage medium is arranged to store the program code for executing following steps:Really
Fixed data connection to be visited needs to access Virtual Private Network:The data of current accessed are parsed, the mesh in data is obtained
Mark access information, wherein target access information includes:The access mark carried in path address, Internet protocol address or data
At least one of know;Target access information is matched with the access data list that prestores, whether judges target access information
The mark for accessing access virtual private network in data list matches with prestoring.
Further, optionally, in the present embodiment, storage medium is arranged to store the journey for executing following steps
Sequence code:First terminal judge target access information whether with prestore access data list in access virtual private network mark
After knowing matching, sending access authentication request to second terminal includes:In the case where the judgment result is yes, display reminding is believed
Breath, wherein prompt message be used to indicate user whether access virtual private network;It receives and confirms incoming instruction, wherein confirmation connects
Enter instruction, is used to indicate first terminal and confirms access virtual private network;It is connect according to confirming that incoming instruction is sent to second terminal
Enter certification request.
Optionally, in the present embodiment, storage medium is arranged to store the program code for executing following steps:According to
Include according to the Virtual Private Network belonging to access confirmation message access server:Testing for second terminal is carried in access confirmation message
In the case of demonstrate,proving signaling, access request is generated according to verification signaling and the authentication information that prestores;Access is sent to server to ask
It asks.
Further, optionally, the authentication information that prestores includes:Verify certificate, wherein verifying certificate includes:Account
And password, account and password are for logging in Virtual Private Network.
Optionally, in the present embodiment, storage medium is arranged to store the program code for executing following steps:
After first terminal access virtual private network, in preset time section, first terminal detects whether exist to virtual private
The operation of network request packet;Testing result be it is no in the case of, first terminal judge current sensing time whether be more than or
Equal to the upper limit threshold in preset time section;In the case where the judgment result is yes, first terminal is sent to Virtual Private Network
Disconnect request, wherein disconnect request, be used to indicate the chain that server disconnects first terminal access virtual private network
Road.
The embodiments of the present invention are for illustration only, can not represent the quality of embodiment.
In the above embodiment of the present invention, all emphasizes particularly on different fields to the description of each embodiment, do not have in some embodiment
The part of detailed description may refer to the associated description of other embodiment.
In several embodiments provided herein, it should be understood that disclosed technology contents can pass through others
Mode is realized.Wherein, the apparatus embodiments described above are merely exemplary, for example, the unit division, only
A kind of division of logic function, formula that in actual implementation, there may be another division manner, such as multiple units or component can combine or
Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual
Between coupling, direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, unit or module
It connects, can be electrical or other forms.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple
In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme
's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also
It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.Above-mentioned integrated list
The form that hardware had both may be used in member is realized, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can be stored in a computer read/write memory medium.Based on this understanding, technical scheme of the present invention is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that a computer
Equipment (can be personal computer, server or network equipment etc.) execute each embodiment the method for the present invention whole or
Part steps.And storage medium above-mentioned includes:USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic disc or CD etc. are various can to store program code
Medium.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered
It is considered as protection scope of the present invention.
Claims (26)
1. a kind of system of access network, which is characterized in that including:Terminal and server, wherein
The terminal is verified for determining that data connection to be visited needs to connect Virtual Private Network by default verification mode
The data to be visited, and according to verification result access request is sent to the server, wherein the default verification mode is used
Whether meet the standard for accessing the server in the authentication information that prestores for verifying the terminal;Belonging to the server
Network is the Virtual Private Network;
The server is connect with the terminal, the access request sent for receiving the terminal, and is connect according to described
Enter and asks to access the terminal into the Virtual Private Network belonging to the server.
2. the system of access network according to claim 1, which is characterized in that the terminal includes:First terminal and
Two terminals, wherein
The first terminal, for determining that data connection to be visited needs to connect the Internet resources in the Virtual Private Network;
And send access authentication request to the second terminal, wherein access authentication request, be used to indicate the second terminal according to
Prestore authentication information described in being asked according to the access authentication, judges whether to confirm that the first terminal accesses the void
Quasi- dedicated network;The authentication information that prestores includes:Verify certificate;
The second terminal is connect with the first terminal, for receiving the access authentication request, and detects the verification card
Whether book matches with the verification signaling for accessing the Virtual Private Network;In the case where testing result is to be, to described first
Terminal returns to access confirmation message, so that the first terminal sends institute according to the access confirmation message to the server
State access request.
3. the system of access network according to claim 2, which is characterized in that the verification certificate includes:Account and close
Code, the account and password are for logging in the Virtual Private Network.
4. the system of access network according to claim 2, which is characterized in that the first terminal includes:Custom system
And checking system, wherein
The checking system, for detecting whether data to be visited in the custom system connect in the Virtual Private Network
Internet resources;And send prompt message to the custom system, wherein the prompt message, which is used to indicate the custom system, is
The no access Virtual Private Network;
The custom system is connect with the checking system, is returned for receiving the prompt message, and according to the prompt message
It returns and confirms access information;
The checking system is additionally operable to, according to the confirmation access information received, connect to described in second terminal transmission
Enter certification request.
5. the system of access network according to claim 2, which is characterized in that the first terminal is additionally operable in access institute
After stating Virtual Private Network, in preset time section, detect whether exist to the Virtual Private Network request data
Operation judges whether current sensing time is greater than or equal in the preset time section in the case where testing result is no
Upper limit threshold, in the case where the judgment result is yes, to the Virtual Private Network transmission disconnect request, wherein institute
It states and disconnects request, be used to indicate the server and disconnect the link that the first terminal accesses the Virtual Private Network.
6. the system of access network according to claim 2 or 4, which is characterized in that the second terminal includes:It is mobile whole
End;Wherein, the mobile terminal, for receiving the access authentication request, and carried in being asked according to the access authentication
The verification array to prestore in the verification certificate and the mobile terminal is verified, in the case where being proved to be successful, to institute
It states first terminal and returns to the access confirmation message.
7. the system of access network according to claim 5, which is characterized in that the server is additionally operable to described in reception
What first terminal was sent disconnects request, and according to the breaking connection request, cuts off the first terminal and access the void
Quasi- dedicated network.
8. a method of access network, which is characterized in that including:
First terminal determines that data connection to be visited needs to access Virtual Private Network;
The first terminal sends access authentication request to second terminal, wherein the access authentication request is used to indicate described
The authentication information that prestores for the first terminal that second terminal carries in being asked according to the access authentication judges whether really
Recognize the first terminal and accesses the Virtual Private Network;
The first terminal receives the access confirmation message that the second terminal is returned according to access authentication request;
The first terminal is according to the Virtual Private Network belonging to the access confirmation message access server.
9. the method for access network according to claim 8, which is characterized in that the first terminal determines number to be visited
According to connection need access Virtual Private Network include:
The first terminal parses the data of the current accessed, obtains the target access information in the data, wherein described
Target access information includes:At least one in the access identities carried in path address, Internet protocol address or the data
Kind;
The first terminal matches the target access information with the access data list that prestores, and judges the target access
Whether information matches with the mark of access virtual private network in the access data list that prestores.
10. the method for access network according to claim 9, which is characterized in that judge the mesh in the first terminal
After whether mark access information matches with the mark of access virtual private network in the access data list that prestores, described first
Terminal sends access authentication request to second terminal:
In the case where the judgment result is yes, the first terminal display reminding information, wherein prompt message is used to indicate user
Whether the Virtual Private Network is accessed;
The first terminal, which receives, confirms incoming instruction, wherein it is true to be used to indicate the first terminal for the confirmation incoming instruction
Recognize the access Virtual Private Network;
The first terminal sends access authentication request according to the confirmation incoming instruction to the second terminal.
11. the method for access network according to claim 8, which is characterized in that the first terminal is according to the access
The Virtual Private Network belonging to confirmation message access server includes:
In the case where the access confirmation message carries the verification signaling of the second terminal, the first terminal is according to described in
Verification signaling and the authentication information that prestores generate access request;
The first terminal sends the access request to the server.
12. the method for access network according to claim 11, which is characterized in that the authentication information packet that prestores
It includes:Verify certificate, wherein the verification certificate includes:Account and password, the account and password are described virtual special for logging in
Use network.
13. the method for access network according to claim 8, which is characterized in that the method further includes:
After the first terminal accesses the Virtual Private Network, in preset time section, the first terminal detection
With the presence or absence of the operation to the Virtual Private Network request data;
In the case where testing result is no, it is described default that the first terminal judges whether current sensing time is greater than or equal to
The upper limit threshold of time interval;
In the case where the judgment result is yes, the first terminal disconnects request to Virtual Private Network transmission,
In, it is described to disconnect request, it is used to indicate the server and disconnects the first terminal and access the Virtual Private Network
Link.
14. a kind of method of access network, which is characterized in that including:
Second terminal receives the access authentication request that first terminal is sent;
The authentication information that prestores for the first terminal that the second terminal carries in being asked according to the access authentication, sentences
It is disconnected whether to confirm the first terminal access virtual private network;
In the case where the judgment result is yes, the second terminal sends access confirmation message to the first terminal.
15. the method for access network according to claim 14, which is characterized in that the second terminal is according to the access
The authentication information that prestores of the first terminal carried in certification request judges whether to confirm that the first terminal access is empty
Quasi- dedicated network includes:
The second terminal parses the authentication information that prestores of the first terminal carried in the access authentication request, obtains
To the verification certificate in the identity information that prestores, wherein the verification certificate includes:Account and password, the account and close
Code is for logging in the Virtual Private Network;
The second terminal detects whether the verification certificate matches with the verification signaling for accessing the Virtual Private Network,
In, the verification signaling is pre-stored verification array in the second terminal.
16. a kind of method of access network, which is characterized in that including:
Server receives the access request that first terminal is sent;
The first terminal is accessed the Virtual Private Network belonging to the server according to the access request by the server.
17. the method for access network according to claim 16, which is characterized in that the server is asked according to the access
It asks and includes by the Virtual Private Network belonging to the first terminal access server:
Parse the access request, obtain the first terminal carried in the access request prestore authentication information with
And the verification signaling of second terminal;
Whether the authentication information that prestores described in verification and the verification signaling meet default access standard;
In the case where check results are to be, the server accesses the first terminal virtual special belonging to the server
Use network.
18. the method for access network according to claim 16, which is characterized in that the method further includes:
Receive the first terminal transmission disconnects request;
And it according to the breaking connection request, cuts off the first terminal and accesses the Virtual Private Network.
19. a kind of method of access network, which is characterized in that including:
Whether data to be visited connect the Internet resources in the Virtual Private Network in detection custom system;
In the case where testing result is to be, prompt message is sent to the custom system, wherein the prompt message is for referring to
Show whether the custom system accesses the Virtual Private Network;
According to the confirmation access information that the custom system received returns, sends the access authentication to second terminal and ask
It asks.
20. a kind of method of access network, which is characterized in that including:
Receive the prompt message that checking system is sent;
It is returned according to the prompt message and confirms access information.
21. a kind of device of access network, which is characterized in that including:
First detection module, for determining that data connection to be visited needs to access Virtual Private Network;
First sending module, for sending access authentication request to second terminal, wherein the access authentication request, for referring to
The authentication information that prestores for showing the first terminal carried during the second terminal is asked according to the access authentication, judges
Whether confirm that the first terminal accesses the Virtual Private Network;
First receiving module, the access confirmation message returned according to access authentication request for receiving the second terminal;
First AM access module, for according to the Virtual Private Network belonging to the access confirmation message access server.
22. a kind of device of access network, which is characterized in that including:
Second receiving module, the access authentication request for receiving first terminal transmission;
First authentication module, the authentication letter that prestores of the first terminal for being carried in being asked according to the access authentication
Breath, judges whether to confirm the first terminal access virtual private network;
Second sending module, in the case where the judgment result is yes, access confirmation message being sent to the first terminal.
23. a kind of Intelligent hardware, which is characterized in that including:Transmitter/receivers, processor, memory and display screen, wherein described
Transmitter/receivers, the access authentication request for receiving first terminal transmission;
The processor is connect with the transmitter/receivers, the first terminal for being carried in being asked according to the access authentication
The authentication information that prestores, judge whether to confirm the first terminal access virtual private network, wherein the processor is logical
It crosses and the verification signaling stored in the memory is called to judge whether to confirm the first terminal access virtual private network, and lead to
It crosses the display screen and shows judging result;
The transmitter/receivers, is additionally operable in the case where the judgment result is yes, and access confirmation message is sent to the first terminal.
24. a kind of device of access network, which is characterized in that including:
Third receiving module, the access request for receiving first terminal transmission;
Second AM access module, it is virtual special belonging to the server for accessing the first terminal according to the access request
Use network.
25. a kind of device of access network, which is characterized in that including:
Second detection module, for detecting whether data to be visited in custom system connect network in the Virtual Private Network
Resource;
Third sending module, in the case where testing result is to be, prompt message to be sent to the custom system, wherein
The prompt message is used to indicate whether the custom system accesses the Virtual Private Network;
4th sending module sends institute according to the confirmation access information that the custom system received returns to second terminal
State access authentication request.
26. a kind of device of access network, which is characterized in that including:
4th receiving module, the prompt message for receiving checking system transmission;
5th sending module confirms access information for being returned according to the prompt message.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710031638.5A CN108322366B (en) | 2017-01-17 | 2017-01-17 | Method, device and system for accessing network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710031638.5A CN108322366B (en) | 2017-01-17 | 2017-01-17 | Method, device and system for accessing network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108322366A true CN108322366A (en) | 2018-07-24 |
CN108322366B CN108322366B (en) | 2021-10-01 |
Family
ID=62891038
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710031638.5A Active CN108322366B (en) | 2017-01-17 | 2017-01-17 | Method, device and system for accessing network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108322366B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109995759A (en) * | 2019-03-04 | 2019-07-09 | 平安科技(深圳)有限公司 | A kind of method and relevant apparatus of physical machine access VPC |
CN112953885A (en) * | 2019-12-11 | 2021-06-11 | 中国移动通信集团山东有限公司 | Virtual private network login method and device and computer equipment |
CN113206817A (en) * | 2020-02-03 | 2021-08-03 | 中移物联网有限公司 | Equipment connection confirmation method and block chain network |
CN113691545A (en) * | 2021-08-26 | 2021-11-23 | 中国电信股份有限公司 | Routing control method and device, electronic equipment and computer readable medium |
CN114546927A (en) * | 2020-11-24 | 2022-05-27 | 北京灵汐科技有限公司 | Data transmission method, core, computer readable medium, electronic device |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040268121A1 (en) * | 2003-06-30 | 2004-12-30 | Art Shelest | Reducing network configuration complexity with transparent virtual private networks |
CN101447907A (en) * | 2008-10-31 | 2009-06-03 | 北京东方中讯联合认证技术有限公司 | VPN secure access method and system thereof |
CN101784049A (en) * | 2009-12-31 | 2010-07-21 | 中兴通讯股份有限公司 | Method and system thereof for controlling cars through mobile terminal |
CN102143492A (en) * | 2010-12-06 | 2011-08-03 | 东莞宇龙通信科技有限公司 | Method for establishing virtual private network (VPN) connection, mobile terminal and server |
CN103746812A (en) * | 2013-12-30 | 2014-04-23 | 迈普通信技术股份有限公司 | Access authentication method and system |
CN104869043A (en) * | 2015-06-04 | 2015-08-26 | 魅族科技(中国)有限公司 | Method for establishing VPN (Virtual Private Network) connection and terminal |
CN105162763A (en) * | 2015-07-29 | 2015-12-16 | 网神信息技术(北京)股份有限公司 | Method and device for processing communication data |
CN105827624A (en) * | 2016-04-26 | 2016-08-03 | 浙江宇视科技有限公司 | Identity verifying system |
CN105871677A (en) * | 2016-05-12 | 2016-08-17 | 北京奇虎科技有限公司 | Method and device for sharing VPN service among application |
CN106209912A (en) * | 2016-08-30 | 2016-12-07 | 迈普通信技术股份有限公司 | Access authorization methods, device and system |
-
2017
- 2017-01-17 CN CN201710031638.5A patent/CN108322366B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040268121A1 (en) * | 2003-06-30 | 2004-12-30 | Art Shelest | Reducing network configuration complexity with transparent virtual private networks |
CN101447907A (en) * | 2008-10-31 | 2009-06-03 | 北京东方中讯联合认证技术有限公司 | VPN secure access method and system thereof |
CN101784049A (en) * | 2009-12-31 | 2010-07-21 | 中兴通讯股份有限公司 | Method and system thereof for controlling cars through mobile terminal |
CN102143492A (en) * | 2010-12-06 | 2011-08-03 | 东莞宇龙通信科技有限公司 | Method for establishing virtual private network (VPN) connection, mobile terminal and server |
CN103746812A (en) * | 2013-12-30 | 2014-04-23 | 迈普通信技术股份有限公司 | Access authentication method and system |
CN104869043A (en) * | 2015-06-04 | 2015-08-26 | 魅族科技(中国)有限公司 | Method for establishing VPN (Virtual Private Network) connection and terminal |
CN105162763A (en) * | 2015-07-29 | 2015-12-16 | 网神信息技术(北京)股份有限公司 | Method and device for processing communication data |
CN105827624A (en) * | 2016-04-26 | 2016-08-03 | 浙江宇视科技有限公司 | Identity verifying system |
CN105871677A (en) * | 2016-05-12 | 2016-08-17 | 北京奇虎科技有限公司 | Method and device for sharing VPN service among application |
CN106209912A (en) * | 2016-08-30 | 2016-12-07 | 迈普通信技术股份有限公司 | Access authorization methods, device and system |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109995759A (en) * | 2019-03-04 | 2019-07-09 | 平安科技(深圳)有限公司 | A kind of method and relevant apparatus of physical machine access VPC |
CN109995759B (en) * | 2019-03-04 | 2022-10-28 | 平安科技(深圳)有限公司 | Method for accessing VPC (virtual private network) by physical machine and related device |
CN112953885A (en) * | 2019-12-11 | 2021-06-11 | 中国移动通信集团山东有限公司 | Virtual private network login method and device and computer equipment |
CN112953885B (en) * | 2019-12-11 | 2023-04-18 | 中国移动通信集团山东有限公司 | Virtual private network login method and device and computer equipment |
CN113206817A (en) * | 2020-02-03 | 2021-08-03 | 中移物联网有限公司 | Equipment connection confirmation method and block chain network |
CN113206817B (en) * | 2020-02-03 | 2022-07-12 | 中移物联网有限公司 | Equipment connection confirmation method and block chain network |
CN114546927A (en) * | 2020-11-24 | 2022-05-27 | 北京灵汐科技有限公司 | Data transmission method, core, computer readable medium, electronic device |
WO2022111462A1 (en) * | 2020-11-24 | 2022-06-02 | 北京灵汐科技有限公司 | Data transmission method, core, computer-readable medium, and electronic device |
CN114546927B (en) * | 2020-11-24 | 2023-08-08 | 北京灵汐科技有限公司 | Data transmission method, core, computer readable medium, and electronic device |
CN113691545A (en) * | 2021-08-26 | 2021-11-23 | 中国电信股份有限公司 | Routing control method and device, electronic equipment and computer readable medium |
CN113691545B (en) * | 2021-08-26 | 2023-03-24 | 中国电信股份有限公司 | Routing control method and device, electronic equipment and computer readable medium |
Also Published As
Publication number | Publication date |
---|---|
CN108322366B (en) | 2021-10-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108322366A (en) | Access the methods, devices and systems of network | |
CN108737327A (en) | Intercept method, apparatus, system, processor and the memory of malicious websites | |
CN109936547A (en) | Identity identifying method, system and calculating equipment | |
EP3179758A1 (en) | Building intercom method, nfc unlocking device and building intercom system | |
CN105933888B (en) | A kind of eSIM card method for burn-recording and device based on NFC | |
CN110351269B (en) | Method for logging in open platform through third-party server | |
CN108512846A (en) | Mutual authentication method and device between a kind of terminal and server | |
CN104618315B (en) | A kind of method, apparatus and system of verification information push and Information Authentication | |
CN104144163B (en) | Auth method, apparatus and system | |
CN105450643B (en) | The authentication method of network insertion, apparatus and system | |
WO2017091401A1 (en) | Identity authentication method, system, business server and authentication server | |
CN104869043B (en) | A kind of method and terminal for establishing VPN connection | |
CN108496380A (en) | server, mobile terminal and program | |
CN107086984A (en) | A kind of method, terminal and server for obtaining and generating identifying code | |
CN110099029A (en) | A kind of auth method, terminal device and server | |
CN106921636A (en) | Identity identifying method and device | |
CN110266642A (en) | Identity identifying method and server, electronic equipment | |
CN105991600A (en) | Identity authentication and apparatus, server and terminal | |
CN107872447A (en) | Electronic device, server, communication system and communication method | |
CN107508822A (en) | Access control method and device | |
CN105828454B (en) | A kind of method, apparatus connecting network and a kind of WIFI routing device | |
CN109861968A (en) | Resource access control method, device, computer equipment and storage medium | |
CN110365701A (en) | The management method of customer terminal equipment, calculates equipment and storage medium at device | |
CN109218370A (en) | Message method and device, electronic equipment | |
CN110099129A (en) | A kind of data transmission method and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1258189 Country of ref document: HK |
|
GR01 | Patent grant | ||
GR01 | Patent grant |